1. R. J. Anderson. The Classification of Hash Functions. In Proceedings of the 4th IMA Conference on Cryptography and Coding, Cirencester, United Kingdom, pp. 83–95, Oxford University Press, 1995.
2. B. den Boer, A. Bosselaers. An Attack on the last two Rounds of MD4. In Advances in Cryptology CRYPTO'91, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 576, pp. 194–203, Springer-Verlag, 1992.
3. J. Dénes, A. D. Keedwell. Latin Squares and their Applications, Akadémiai Kiadó, Budapest, 1974.
4. I. B. Damgård. A Design Principle for Hash Functions. In Advances in Cryptology CRYPTO'89, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 435, pp. 416–427, Springer-Verlag, 1990.
5. R. W. Davies, W. L. Price. Digital Signature — an Update. In Proceedings of the International Conference on Computer Communications, Sydney, pp. 843–847, North-Holland, 1985.